summaryrefslogtreecommitdiff
path: root/chromium/net/third_party/quiche/overrides/quiche_platform_impl/quiche_default_proof_providers_impl.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/third_party/quiche/overrides/quiche_platform_impl/quiche_default_proof_providers_impl.cc')
-rw-r--r--chromium/net/third_party/quiche/overrides/quiche_platform_impl/quiche_default_proof_providers_impl.cc29
1 files changed, 15 insertions, 14 deletions
diff --git a/chromium/net/third_party/quiche/overrides/quiche_platform_impl/quiche_default_proof_providers_impl.cc b/chromium/net/third_party/quiche/overrides/quiche_platform_impl/quiche_default_proof_providers_impl.cc
index ada6baa8f5f..9de5c4d53bf 100644
--- a/chromium/net/third_party/quiche/overrides/quiche_platform_impl/quiche_default_proof_providers_impl.cc
+++ b/chromium/net/third_party/quiche/overrides/quiche_platform_impl/quiche_default_proof_providers_impl.cc
@@ -1,4 +1,4 @@
-// Copyright (c) 2019 The Chromium Authors. All rights reserved.
+// Copyright 2019 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
@@ -45,7 +45,7 @@ namespace quiche {
namespace {
std::set<std::string> UnknownRootAllowlistForHost(std::string host) {
- if (!GetQuicFlag(FLAGS_allow_unknown_root_cert)) {
+ if (!GetQuicFlag(allow_unknown_root_cert)) {
return std::set<std::string>();
}
return {host};
@@ -58,14 +58,15 @@ class ProofVerifierChromiumWithOwnership : public net::ProofVerifierChromium {
ProofVerifierChromiumWithOwnership(
std::unique_ptr<net::CertVerifier> cert_verifier,
std::string host)
- : net::ProofVerifierChromium(cert_verifier.get(),
- &ct_policy_enforcer_,
- &transport_security_state_,
- /*sct_auditing_delegate=*/nullptr,
- UnknownRootAllowlistForHost(host),
- // Fine to use an empty NetworkIsolationKey
- // here, since this isn't used in Chromium.
- net::NetworkIsolationKey()),
+ : net::ProofVerifierChromium(
+ cert_verifier.get(),
+ &ct_policy_enforcer_,
+ &transport_security_state_,
+ /*sct_auditing_delegate=*/nullptr,
+ UnknownRootAllowlistForHost(host),
+ // Fine to use an empty NetworkAnonymizationKey
+ // here, since this isn't used in Chromium.
+ net::NetworkAnonymizationKey()),
cert_verifier_(std::move(cert_verifier)) {}
private:
@@ -88,12 +89,12 @@ std::unique_ptr<quic::ProofSource> CreateDefaultProofSourceImpl() {
quic::QuicChromiumClock::GetInstance()));
CHECK(proof_source->Initialize(
#if BUILDFLAG(IS_WIN)
- base::FilePath(base::UTF8ToWide(GetQuicFlag(FLAGS_certificate_file))),
- base::FilePath(base::UTF8ToWide(GetQuicFlag(FLAGS_key_file))),
+ base::FilePath(base::UTF8ToWide(GetQuicFlag(certificate_file))),
+ base::FilePath(base::UTF8ToWide(GetQuicFlag(key_file))),
base::FilePath()));
#else
- base::FilePath(GetQuicFlag(FLAGS_certificate_file)),
- base::FilePath(GetQuicFlag(FLAGS_key_file)), base::FilePath()));
+ base::FilePath(GetQuicFlag(certificate_file)),
+ base::FilePath(GetQuicFlag(key_file)), base::FilePath()));
#endif
return std::move(proof_source);
}